Warning: Permanently added '10.128.15.206' (ECDSA) to the list of known hosts. [ 49.815797] random: sshd: uninitialized urandom read (32 bytes read) [ 49.931669] audit: type=1400 audit(1571643817.719:36): avc: denied { map } for pid=6768 comm="syz-executor189" path="/root/syz-executor189016238" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 50.180922] IPVS: ftp: loaded support on port[0] = 21 executing program [ 50.918088] audit: type=1400 audit(1571643818.699:37): avc: denied { map } for pid=6769 comm="syz-executor189" path="/dev/usbmon0" dev="devtmpfs" ino=13870 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:usbmon_device_t:s0 tclass=chr_file permissive=1 [ 50.965732] [ 50.967407] ====================================================== [ 50.973798] WARNING: possible circular locking dependency detected [ 50.980317] 4.14.150 #0 Not tainted [ 50.983999] ------------------------------------------------------ [ 50.990349] syz-executor189/6771 is trying to acquire lock: [ 50.996048] (&mm->mmap_sem){++++}, at: [] __might_fault+0xe0/0x1d0 [ 51.004102] [ 51.004102] but task is already holding lock: [ 51.010094] (&rp->fetch_lock){+.+.}, at: [] mon_bin_fetch+0x37/0x2e0 [ 51.018232] [ 51.018232] which lock already depends on the new lock. [ 51.018232] [ 51.026574] [ 51.026574] the existing dependency chain (in reverse order) is: [ 51.034340] [ 51.034340] -> #1 (&rp->fetch_lock){+.+.}: [ 51.040052] lock_acquire+0x16f/0x430 [ 51.044411] __mutex_lock+0xe8/0x1470 [ 51.048718] mutex_lock_nested+0x16/0x20 [ 51.053288] mon_bin_vma_fault+0x6f/0x280 [ 51.057991] __do_fault+0x104/0x390 [ 51.062119] __handle_mm_fault+0x2460/0x3470 [ 51.067034] handle_mm_fault+0x293/0x7c0 [ 51.071600] __get_user_pages+0x465/0x1220 [ 51.076412] populate_vma_page_range+0x18e/0x230 [ 51.081673] __mm_populate+0x198/0x2c0 [ 51.086063] vm_mmap_pgoff+0x1be/0x1d0 [ 51.090569] SyS_mmap_pgoff+0x3ca/0x520 [ 51.095046] SyS_mmap+0x16/0x20 [ 51.098842] do_syscall_64+0x1e8/0x640 [ 51.103237] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 51.109018] [ 51.109018] -> #0 (&mm->mmap_sem){++++}: [ 51.114572] __lock_acquire+0x2cb3/0x4620 [ 51.119228] lock_acquire+0x16f/0x430 [ 51.123538] __might_fault+0x143/0x1d0 [ 51.127968] mon_bin_fetch+0x212/0x2e0 [ 51.132360] mon_bin_ioctl+0x1c5/0xb50 [ 51.136827] do_vfs_ioctl+0x7ae/0x1060 [ 51.141305] SyS_ioctl+0x8f/0xc0 [ 51.145177] do_syscall_64+0x1e8/0x640 [ 51.149571] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 51.155385] [ 51.155385] other info that might help us debug this: [ 51.155385] [ 51.163639] Possible unsafe locking scenario: [ 51.163639] [ 51.169767] CPU0 CPU1 [ 51.174458] ---- ---- [ 51.179175] lock(&rp->fetch_lock); [ 51.182877] lock(&mm->mmap_sem); [ 51.188960] lock(&rp->fetch_lock); [ 51.195262] lock(&mm->mmap_sem); [ 51.198822] [ 51.198822] *** DEADLOCK *** [ 51.198822] [ 51.204906] 1 lock held by syz-executor189/6771: [ 51.209643] #0: (&rp->fetch_lock){+.+.}, at: [] mon_bin_fetch+0x37/0x2e0 [ 51.218354] [ 51.218354] stack backtrace: [ 51.222944] CPU: 1 PID: 6771 Comm: syz-executor189 Not tainted 4.14.150 #0 [ 51.229943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 51.239369] Call Trace: [ 51.241950] dump_stack+0x138/0x197 [ 51.245652] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 51.251125] __lock_acquire+0x2cb3/0x4620 [ 51.255299] ? mark_held_locks+0xb1/0x100 [ 51.259434] ? trace_hardirqs_on+0x10/0x10 [ 51.263652] ? save_trace+0x290/0x290 [ 51.267617] ? mon_bin_wait_event.isra.0+0x2d7/0x4c0 [ 51.272707] lock_acquire+0x16f/0x430 [ 51.276493] ? __might_fault+0xe0/0x1d0 [ 51.280456] __might_fault+0x143/0x1d0 [ 51.284327] ? __might_fault+0xe0/0x1d0 [ 51.288328] mon_bin_fetch+0x212/0x2e0 [ 51.292244] mon_bin_ioctl+0x1c5/0xb50 [ 51.296116] ? mon_bin_read+0x5e0/0x5e0 [ 51.300080] ? mon_bin_read+0x5e0/0x5e0 [ 51.304172] do_vfs_ioctl+0x7ae/0x1060 [ 51.308043] ? selinux_file_mprotect+0x5d0/0x5d0 [ 51.312786] ? lock_downgrade+0x740/0x740 [ 51.316924] ? ioctl_preallocate+0x1c0/0x1c0 [ 51.321319] ? __fget+0x237/0x370 [ 51.324756] ? security_file_ioctl+0x7d/0xb0 [ 51.329152] ? security_file_ioctl+0x89/0xb0 [ 51.333549] SyS_ioctl+0x8f/0xc0 [ 51.336898] ? do_vfs_ioctl+0x1060/0x1060 [ 51.341033] do_syscall_64+0x1e8/0x640 [ 51.344906] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 51.349768] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 51.355067] RIP: 0033:0x44a0a9 [ 51.358240] RSP: 002b:00007f321c359ce8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 51.366021] RAX: ffffffffffffffda RBX: 00000000006dbc38 RCX: 000000000044a0a9 [ 51.373277] RDX: 0000000020000280 RSI: 00000000c0109207 RDI: 0000000000000003 [ 51.380717] RBP: 00000000006dbc30 R08: 00007f321c35a700 R09: 0000000000000000 [ 51.388150] R10: 00007f321c35a700 R11: 0000000000000246 R12: 00000000006dbc3c [ 51.395412] R13: 00007fffd05eaa7f R14: 00007f321c35a9c0 R15: 000000000000002d